Sciweavers

1627 search results - page 107 / 326
» On context in authorization policy
Sort
View
CHI
2007
ACM
14 years 11 months ago
Effects of presenting geographic context on tracking activity between cameras
A common video surveillance task is to keep track of people moving around the space being monitored. It is often difficult to track activity between cameras because locations such...
Andreas Girgensohn, Frank M. Shipman III, Thea Tur...
ACL
1996
14 years 2 days ago
Combining Trigram-based and Feature-based Methods for Context-Sensitive Spelling Correction
This paper addresses the problem of correcting spelling errors that result in valid, though unintended words (such as peace and piece, or quiet and quite) and also the problem of ...
Andrew R. Golding, Yves Schabes
ECOOPW
1999
Springer
14 years 3 months ago
The Role of Trust Management in Distributed Systems Security
Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming unde...
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
CHI
2005
ACM
14 years 11 months ago
Work coordination, workflow, and workarounds in a medical context
In this paper we report an ethnographic study of workarounds--informal temporary practices for handling exceptions to normal workflow--in a hospital environment. Workarounds are a...
Marina Kobayashi, Susan R. Fussell, Yan Xiao, F. J...
CHI
2010
ACM
14 years 5 months ago
Mobile taskflow in context: a screenshot study of smartphone usage
The impact of interruptions on workflow and productivity has been extensively studied in the PC domain, but while fragmented user attention is recognized as an inherent aspect of ...
Amy K. Karlson, Shamsi T. Iqbal, Brian Meyers, Gon...